Security 101: Digital Extortion in 2018

Digital extortion is one of the most lucrative ways cybercriminals can profit in today’s threat landscape. Many have fallen victim to this particular scheme and been bilked of their money — from ordinary users to big enterprises.

Everyone is a potential target, which is why being informed about what digital extortion is, how it’s carried out and how to protect against it is critical. This is especially relevant in 2018, where we predict that digital extortion efforts will involve other methods besides the tried and tested ransomware attack.

What is digital extortion?

Digital extortion is the act of coercing an individual or organization to pay in exchange for gaining back access to stolen cyber assets. The assets may be anything that directly ties in to the victim’s personal information, business operations, or financial interests. Examples of these include document files, database files, access to servers, etc.

How is digital extortion carried out?

Currently, the bulk of digital extortion is done with ransomware attacks. A ransomware attack involves malware that, upon infecting a user’s system, encrypts the files stored in the hard drives, thereby rendering them inaccessible. It typically compromises the personal documents that the user may have stored in those drives. In any case, the user is then asked, either through a text file or a message window, to send an amount of money to the culprit in order to have the files decrypted. Should the user pay, the act of digital extortion is deemed complete.

Given the success of ransomware campaigns, cybercriminals are likely to use other methods of digital extortion, including the following:

Online smear campaigns. Cybercriminals may engage in online smear campaigns against public figures, such as celebrities and politicians, which may go further into humiliation or harassment campaigns against the individuals. Once enough damage has been done to the targets’ online presence on social media, the cybercriminals may offer to stop the campaign for a fee.

Negative review spamming or black propaganda. Companies with upcoming new releases such as movies and devices may find the review pages of their products being spammed with negative reviews, in an attempt to bring the public perception of the products down. Once enough damage has been done, the cybercriminals may offer to retract the reviews for a price.

Online blackmail. Cybercriminals may blackmail public figures such as celebrities and politicians with compromising images or details they may have obtained through hacking.

Equipment or machinery hijacking. Cybercriminals may hack into assembly line manufacturing equipment, industrial robots, or public utility management systems and deactivate them/render them inaccessible. They will then demand money from the owners in return for giving back access to the equipment.

Phishing. Users may find themselves being subjected to phishing, wherein their online credentials and other details are stolen through spoofed login websites. This can then result in unauthorized access to personal or even corporate files.

It should be noted that while most of these threats may seem geared toward public figures and companies, the fact remains that cybercriminals commonly carry out their attacks indiscriminately. This means that even private individuals or people who are not in the public spotlight may also become victims of digital extortion.

What safeguards can be used against digital extortion?

Users and public individuals can mitigate most digital extortion attacks by doing the following:

Refrain from posting too many details on social media.

Avoid taking compromising or embarrassing pictures and saving them in an online archive or storage service, as these may be hacked by cybercriminals.

2019 SECURITY PREDICTIONS

Our security predictions for 2019 are based on our experts’ analysis of the progress of current and emerging technologies, user behavior, and market trends, and their impact on the threat landscape.View the 2019 Security Predictions